Aspects of Isas Begin with Vonneumann Model • Implicit Structure of All Modern Isas • CPU + Memory (Data & Insns) • Sequential Instructions

Total Page:16

File Type:pdf, Size:1020Kb

Aspects of Isas Begin with Vonneumann Model • Implicit Structure of All Modern Isas • CPU + Memory (Data & Insns) • Sequential Instructions Aspects of ISAs Begin with VonNeumann model • Implicit structure of all modern ISAs • CPU + memory (data & insns) • Sequential instructions • Format • Length and encoding • Operand model Aspects of ISAs • Where (other than memory) are operands stored? • Datatypes and operations • Control 27 28 The Sequential Model Instruction Length and Format Length • Implicit model of all modern ISAs • Fixed length • Basic feature: the program counter (PC) Fetch PC Fetch[PC] • Most common is 32 bits • Defines total order on dynamic instruction Decode Decode + Simple implementation (next PC often just PC+4) • Next PC is PC++ (except for ctrl insns) Read Inputs Read Inputs – Code density: 32 bits to increment a register by 1 • Order + named storage define computation Execute • Variable length Execute Write Output Value flows from X to Y via storage A iff: +Code density Write Output Next PC insn X A output A + x86 can do increment in one 8-bit instruction Next PC insn YA input A – Complex fetch (where does next instruction begin?) • Processor logically executes loop at left • Compromise: two lengths • Instruction execution assumed atomic • E.g., MIPS16 or ARM’s Thumb • Instruction X finishes before insn X+1 starts Encoding • More parallel alternatives have been proposed • A few simple encodings simplify decoder • x86 decoder one nasty piece of logic 29 30 Example Instruction Encodings Operations and Datatypes MIPS • Datatypes • Fixed length • S/W: attribute of data • H/W: attribute of operation, data is just 0/1’s • 32-bits, 3 formats, simple encoding Fetch Decode • All processors support R-type Op(6) Rs(5) Rt(5) Rd(5) Sh(5) Func(6) Read Inputs • 2’s comp. integer arithmetic/logic Execute (8/16/32/64-bit) I-type Op(6) Rs(5) Rt(5) Immed(16) Write Output • IEEE754 floating-point arithmetic (32/64 bit) Next Insn • Intel has 80-bit floating-point J-type Op(6) Target(26) • Most processors now support x86 • “Packed-integer” insns, e.g., MMX • Variable length encoding (1 to 16 bytes) • “Packed-fp” insns, e.g., SSE/SSE2 • For multimedia, more about these later • Processors no longer (??) support Prefix*(1-4) Op OpExt* ModRM* SIB* Disp*(1-4) Imm*(1-4) • Decimal, other fixed-point arithmetic • Binary-coded decimal (BCD) 31 32 Where Does Data Live? How Much Memory? Address Size • What does “64-bit” in a 64-bit ISA mean? • Memory • Support memory size of 264 • Fundamental storage space Fetch • Alternative (wrong) definition: width of calculation Decode operations Read Inputs • Registers • “Virtual” address size Execute Write Output • Faster than memory, quite handy • Determines size of addressable (usable) memory Next Insn • Most processors have these too • x86 evolution: • 4-bit (4004), 8-bit (8008), 16-bit (8086), 24-bit (80286), • 32-bit + protected memory (80386) • Immediates • 64-bit (AMD’s Opteron & Intel’s EM64T Pentium4) Values spelled out as bits in instructions • • Most ISAs moving to 64 bits (if not already there) • Input only 33 34 How Many Registers? How Are Memory Locations Specified? • Registers faster than memory, have as many as possible? • Registers are specified directly • No • Register names are short, encoded in instructions • One reason registers are faster: there are fewer of them • Some instructions implicitly read/write certain registers • Small is fast (hardware truism) • Another: they are directly addressed (no address calc) – More of them, means larger specifiers • How are addresses specified? – Fewer registers per instruction or indirect addressing • Addresses are long (64-bit) • Not everything can be put in registers • Addressing mode: how are insn bits converted to • Structures, arrays, anything pointed-to addresses? – More registers more saving/restoring • Trend: more registers: 8 (x86)32 (MIPS) 128 (IA64) • 64-bit x86 has 16 64-bit integer and 16 128-bit FP registers 35 36 Memory Addressing Addressing Modes Examples • Addressing mode: way of specifying address • MIPS • Used in mem-mem or load/store instructions in register ISA • Displacement: R1+offset (16-bit) • Examples • Experiments showed this covered 80% of accesses on VAX • Register-Indirect: R1=mem[R2] • Displacement: R1=mem[R2+immed] • x86 (MOV instructions) • Index-base: R1=mem[R2+R3] • Absolute: zero + offset (8/16/32-bit) • Memory-indirect: R1=mem[mem[R2]] • Register indirect: R1 • Auto-increment: R1=mem[R2], R2= R2+1 • Indexed: R1+R2 • Auto-indexing: R1=mem[R2+immed], R2=R2+immed • Displacement: R1+offset (8/16/32-bit) • Scaled: R1=mem[R2+R3*immed1+immed2] • Scaled: R1 + (R2*Scale) + offset(8/16/32-bit) • PC-relative: R1=mem[PC+imm] Scale = 1, 2, 4, 8 • What high-level program idioms are these used for? • What implementation impact? What impact on insn count? 2 more issues: alignment & endianness 37 38 How Many Explicit Operands / ALU Insn? Operand Model Pros and Cons • Operand model: how many explicit operands / ALU insn? • Metric I: static code size • 3: general-purpose • Want: many implicit operands (stack), high level insns add R1,R2,R3 means [R1] = [R2] + [R3] (MIPS) • 2: multiple explicit accumulators (output also input) • Metric II: data memory traffic add R1,R2 means [R2] = [R2] + [R1] (x86) • Want: many long-lived operands on-chip (load-store) • 1: one implicit accumulator add R1 means ACC = ACC + [R1] • Metric III: CPI • 0: hardware stack • Want: short latencies, little variability (load-store) add means STK[TOS++] = STK[--TOS] + STK[--TOS] • 4+: useful only in special situations • CPI and data memory traffic more important these days • Examples show register operands but operands can be memory addresses, or mixed register/memory • Trend: most new ISAs are load-store ISAs or hybrids • ISA w/register-only ALU insns are = load-store architecture 39 40 Control Transfers Control Transfers I: Computing Targets • Default next-PC is PC + sizeof(current insn) • The issues • Note: PC called IR (instruction register) in x86 • How far (statically) do you need to jump? (w/in fn vs outside) Fetch • Do you need to jump to a different place each time? Decode • Branches and jumps can change that • How many bits do you need to encode the target? Read Inputs • Otherwise dynamic program == static program • PC-relative Execute • Not useful Write Output • Position-independent within procedure Next Insn • Computing targets: where to jump to • Used for branches and jumps within a procedure • For all branches and jumps • Absolute • Absolute / PC-relative / indirect • Position independent outside procedure • Used for procedure calls • Testing conditions: whether to jump at all • For (conditional) branches only • Indirect (target found in register) • Compare-branch / condition-codes / condition • Needed for jumping to dynamic targets registers • For returns, dynamic procedure calls, switch statements 41 42 Control Transfers II: Testing Conditions ISAs Also Include Support For… • Compare and branch insns • Operating systems & memory protection branch-less-than R1,10,target • Privileged mode +Simple – Two ALUs (for condition & target address) • System call (TRAP) –Extra latency • Exceptions & interrupts • Implicit condition codes (x86) • Interacting with I/O devices cmp R1,10 // sets “negative” CC/flag branch-neg target + More room for target, condition codes set “for free” • Multiprocessor support + Branch insn simple and fast – Implicit dependence is tricky • “Atomic” operations for synchronization • Conditions in regs, separate branch (MIPS) set-less-than R2,R1,10 • Data-level parallelism branch-not-equal-zero R2,target – Additional insns • Pack many values into a wide register + one ALU per insn, explicit dependence • Intel’s SSE2: 4x32-bit float-point values in 128-bit register > 80% of branches are (in)equalities/comparisons to 0 • Define parallel operations (four “adds” in one cycle) 43 44 RISC and CISC • RISC: reduced-instruction set computer • Coined by Patterson in early 80’s • Berkeley RISC-I (Patterson), Stanford MIPS (Hennessy), IBM 801 (Cocke), PowerPC, ARM, SPARC, Alpha, PA-RISC • CISC: complex-instruction set computer • Term didn’t exist before “RISC” • x86, VAX, Motorola 68000, etc. • Philosophical war (one of several) started in mid 1980’s • RISC “won” the technology battles The RISC vs. CISC Debate • CISC won the high-end commercial war (1990s to today) • Compatibility a stronger force than anyone (but Intel) thought • RISC won the embedded computing war 45 46 The Setup The RISC Tenets • Pre 1980 • Single-cycle execution • Bad compilers (so assembly written by hand) • CISC: many multicycle operations • Hardwired control • Complex, high-level ISAs (easier to write assembly) • CISC: microcoded multi-cycle operations • Around 1982 • Load/store architecture • Moore’s Law makes fast single-chip microprocessor • CISC: register-memory and memory-memory possible… …but only for small, simple ISAs • Few memory addressing modes • CISC: many modes • Performance advantage of “integration” was compelling • Fixed-length instruction format • Compilers had to get involved in a big way • CISC: many formats and lengths • Reliance on compiler optimizations RISC manifesto: create ISAs that… • CISC: hand assemble to get good performance • Many registers (compilers are better at using them) • Simplify single-chip implementation • CISC: few registers • Facilitate optimizing compilation 47 48 CISCs and RISCs The Debate • RISC argument • The CISCs: x86, VAX (Virtual Address eXtension to PDP-11) • CISC is fundamentally handicapped by complexity • Variable length instructions: 1-321 bytes!!! • For a given technology, RISC will be better (faster) • 14 GPRs + PC + stack-pointer
Recommended publications
  • How Data Hazards Can Be Removed Effectively
    International Journal of Scientific & Engineering Research, Volume 7, Issue 9, September-2016 116 ISSN 2229-5518 How Data Hazards can be removed effectively Muhammad Zeeshan, Saadia Anayat, Rabia and Nabila Rehman Abstract—For fast Processing of instructions in computer architecture, the most frequently used technique is Pipelining technique, the Pipelining is consider an important implementation technique used in computer hardware for multi-processing of instructions. Although multiple instructions can be executed at the same time with the help of pipelining, but sometimes multi-processing create a critical situation that altered the normal CPU executions in expected way, sometime it may cause processing delay and produce incorrect computational results than expected. This situation is known as hazard. Pipelining processing increase the processing speed of the CPU but these Hazards that accrue due to multi-processing may sometime decrease the CPU processing. Hazards can be needed to handle properly at the beginning otherwise it causes serious damage to pipelining processing or overall performance of computation can be effected. Data hazard is one from three types of pipeline hazards. It may result in Race condition if we ignore a data hazard, so it is essential to resolve data hazards properly. In this paper, we tries to present some ideas to deal with data hazards are presented i.e. introduce idea how data hazards are harmful for processing and what is the cause of data hazards, why data hazard accord, how we remove data hazards effectively. While pipelining is very useful but there are several complications and serious issue that may occurred related to pipelining i.e.
    [Show full text]
  • Flynn's Taxonomy
    Flynn’s Taxonomy n Michael Flynn (from Stanford) q Made a characterization of computer systems which became known as Flynn’s Taxonomy Computer Instructions Data SISD – Single Instruction Single Data Systems SI SISD SD SIMD – Single Instruction Multiple Data Systems “Vector Processors” SIMD SD SI SIMD SD Multiple Data SIMD SD MIMD Multiple Instructions Multiple Data Systems “Multi Processors” Multiple Instructions Multiple Data SI SIMD SD SI SIMD SD SI SIMD SD MISD – Multiple Instructions / Single Data Systems n Some people say “pipelining” lies here, but this is debatable Single Data Multiple Instructions SIMD SI SD SIMD SI SIMD SI Abbreviations •PC – Program Counter •MAR – Memory Access Register •M – Memory •MDR – Memory Data Register •A – Accumulator •ALU – Arithmetic Logic Unit •IR – Instruction Register •OP – Opcode •ADDR – Address •CLU – Control Logic Unit LOAD X n MAR <- PC n MDR <- M[ MAR ] n IR <- MDR n MAR <- IR[ ADDR ] n DECODER <- IR[ OP ] n MDR <- M[ MAR ] n A <- MDR ADD n MAR <- PC n MDR <- M[ MAR ] n IR <- MDR n MAR <- IR[ ADDR ] n DECODER <- IR[ OP ] n MDR <- M[ MAR ] n A <- A+MDR STORE n MDR <- A n M[ MAR ] <- MDR SISD Stack Machine •Stack Trace •Push 1 1 _ •Push 2 2 1 •Add 2 3 •Pop _ 3 •Pop C _ _ •First Stack Machine •B5000 Array Processor Array Processors n One of the first Array Processors was the ILLIIAC IV n Load A1, V[1] n Load B1, Y[1] n Load A2, V[2] n Load B2, Y[2] n Load A3, V[3] n Load B3, Y[3] n ADDALL n Store C1, W[1] n Store C2, W[2] n Store C3, W[3] Memory Interleaving Definition: Memory interleaving is a design used to gain faster access to memory, by organizing memory into separate memories, each with their own MAR (memory address register).
    [Show full text]
  • Computer Organization & Architecture Eie
    COMPUTER ORGANIZATION & ARCHITECTURE EIE 411 Course Lecturer: Engr Banji Adedayo. Reg COREN. The characteristics of different computers vary considerably from category to category. Computers for data processing activities have different features than those with scientific features. Even computers configured within the same application area have variations in design. Computer architecture is the science of integrating those components to achieve a level of functionality and performance. It is logical organization or designs of the hardware that make up the computer system. The internal organization of a digital system is defined by the sequence of micro operations it performs on the data stored in its registers. The internal structure of a MICRO-PROCESSOR is called its architecture and includes the number lay out and functionality of registers, memory cell, decoders, controllers and clocks. HISTORY OF COMPUTER HARDWARE The first use of the word ‘Computer’ was recorded in 1613, referring to a person who carried out calculation or computation. A brief History: Computer as we all know 2day had its beginning with 19th century English Mathematics Professor named Chales Babage. He designed the analytical engine and it was this design that the basic frame work of the computer of today are based on. 1st Generation 1937-1946 The first electronic digital computer was built by Dr John V. Atanasoff & Berry Cliford (ABC). In 1943 an electronic computer named colossus was built for military. 1946 – The first general purpose digital computer- the Electronic Numerical Integrator and computer (ENIAC) was built. This computer weighed 30 tons and had 18,000 vacuum tubes which were used for processing.
    [Show full text]
  • Pipeline and Vector Processing
    Computer Organization and Architecture Chapter 4 : Pipeline and Vector processing Chapter – 4 Pipeline and Vector Processing 4.1 Pipelining Pipelining is a technique of decomposing a sequential process into suboperations, with each subprocess being executed in a special dedicated segment that operates concurrently with all other segments. The overlapping of computation is made possible by associating a register with each segment in the pipeline. The registers provide isolation between each segment so that each can operate on distinct data simultaneously. Perhaps the simplest way of viewing the pipeline structure is to imagine that each segment consists of an input register followed by a combinational circuit. o The register holds the data. o The combinational circuit performs the suboperation in the particular segment. A clock is applied to all registers after enough time has elapsed to perform all segment activity. The pipeline organization will be demonstrated by means of a simple example. o To perform the combined multiply and add operations with a stream of numbers Ai * Bi + Ci for i = 1, 2, 3, …, 7 Each suboperation is to be implemented in a segment within a pipeline. R1 Ai, R2 Bi Input Ai and Bi R3 R1 * R2, R4 Ci Multiply and input Ci R5 R3 + R4 Add Ci to product Each segment has one or two registers and a combinational circuit as shown in Fig. 9-2. The five registers are loaded with new data every clock pulse. The effect of each clock is shown in Table 4-1. Compiled By: Er. Hari Aryal [[email protected]] Reference: W. Stallings | 1 Computer Organization and Architecture Chapter 4 : Pipeline and Vector processing Fig 4-1: Example of pipeline processing Table 4-1: Content of Registers in Pipeline Example General Considerations Any operation that can be decomposed into a sequence of suboperations of about the same complexity can be implemented by a pipeline processor.
    [Show full text]
  • Computer Organization Structure of a Computer Registers Register
    Computer Organization Structure of a Computer z Computer design as an application of digital logic design procedures z Block diagram view address z Computer = processing unit + memory system Processor read/write Memory System central processing data z Processing unit = control + datapath unit (CPU) z Control = finite state machine y Inputs = machine instruction, datapath conditions y Outputs = register transfer control signals, ALU operation control signals codes Control Data Path y Instruction interpretation = instruction fetch, decode, data conditions execute z Datapath = functional units + registers instruction unit execution unit y Functional units = ALU, multipliers, dividers, etc. instruction fetch and functional units interpretation FSM y Registers = program counter, shifters, storage registers and registers CS 150 - Spring 2001 - Computer Organization - 1 CS 150 - Spring 2001 - Computer Organization - 2 Registers Register Transfer z Selectively loaded EN or LD input z Point-to-point connection MUX MUX MUX MUX z Output enable OE input y Dedicated wires y Muxes on inputs of rs rt rd R4 z Multiple registers group 4 or 8 in parallel each register z Common input from multiplexer y Load enables LD OE for each register rs rt rd R4 D7 Q7 OE asserted causes FF state to be D6 Q6 connected to output pins; otherwise they y Control signals D5 Q5 are left unconnected (high impedance) MUX D4 Q4 for multiplexer D3 Q3 D2 Q2 LD asserted during a lo-to-hi clock D1 Q1 transition loads new data into FFs z Common bus with output enables D0 CLK
    [Show full text]
  • Computer Architectures
    Parallel (High-Performance) Computer Architectures Tarek El-Ghazawi Department of Electrical and Computer Engineering The George Washington University Tarek El-Ghazawi, Introduction to High-Performance Computing slide 1 Introduction to Parallel Computing Systems Outline Definitions and Conceptual Classifications » Parallel Processing, MPP’s, and Related Terms » Flynn’s Classification of Computer Architectures Operational Models for Parallel Computers Interconnection Networks MPP’s Performance Tarek El-Ghazawi, Introduction to High-Performance Computing slide 2 Definitions and Conceptual Classification What is Parallel Processing? - A form of data processing which emphasizes the exploration and exploitation of inherent parallelism in the underlying problem. Other related terms » Massively Parallel Processors » Heterogeneous Processing – In the1990s, heterogeneous workstations from different processor vendors – Now, accelerators such as GPUs, FPGAs, Intel’s Xeon Phi, … » Grid computing » Cloud Computing Tarek El-Ghazawi, Introduction to High-Performance Computing slide 3 Definitions and Conceptual Classification Why Massively Parallel Processors (MPPs)? » Increase processing speed and memory allowing studies of problems with higher resolutions or bigger sizes » Provide a low cost alternative to using expensive processor and memory technologies (as in traditional vector machines) Tarek El-Ghazawi, Introduction to High-Performance Computing slide 4 Stored Program Computer The IAS machine was the first electronic computer developed, under
    [Show full text]
  • UTP Cable Connectors
    Computer Architecture Prof. Dr. Nizamettin AYDIN [email protected] MIPS ISA - I [email protected] http://www.yildiz.edu.tr/~naydin 1 2 Outline Computer Architecture • Overview of the MIPS architecture • can be viewed as – ISA vs Microarchitecture? – the machine language the CPU implements – CISC vs RISC • Instruction set architecture (ISA) – Basics of MIPS – Built in data types (integers, floating point numbers) – Components of the MIPS architecture – Fixed set of instructions – Fixed set of on-processor variables (registers) – Datapath and control unit – Interface for reading/writing memory – Memory – Mechanisms to do input/output – Memory addressing issue – how the ISA is implemented – Other components of the datapath • Microarchitecture – Control unit 3 4 Computer Architecture MIPS Architecture • Microarchitecture • MIPS – An acronym for Microprocessor without Interlocking Pipeline Stages – Not to be confused with a unit of computing speed equivalent to a Million Instructions Per Second • MIPS processor – born in the early 1980s from the work done by John Hennessy and his students at Stanford University • exploring the architectural concept of RISC – Originally used in Unix workstations, – now mainly used in small devices • Play Station, routers, printers, robots, cameras 5 6 Copyright 2000 N. AYDIN. All rights reserved. 1 MIPS Architecture CISC vs RISC • Designer MIPS Technologies, Imagination Technologies • Advantages of CISC Architecture: • Bits 64-bit (32 → 64) • Introduced 1985; – Microprogramming is easy to implement and much • Version MIPS32/64 Release 6 (2014) less expensive than hard wiring a control unit. • Design RISC – It is easy to add new commands into the chip without • Type Register-Register changing the structure of the instruction set as the • Encoding Fixed architecture uses general-purpose hardware to carry out • Branching Compare and branch commands.
    [Show full text]
  • Assembly Language: IA-X86
    Assembly Language for x86 Processors X86 Processor Architecture CS 271 Computer Architecture Purdue University Fort Wayne 1 Outline Basic IA Computer Organization IA-32 Registers Instruction Execution Cycle Basic IA Computer Organization Since the 1940's, the Von Neumann computers contains three key components: Processor, called also the CPU (Central Processing Unit) Memory and Storage Devices I/O Devices Interconnected with one or more buses Data Bus Address Bus data bus Control Bus registers Processor I/O I/O IA: Intel Architecture Memory Device Device (CPU) #1 #2 32-bit (or i386) ALU CU clock control bus address bus Processor The processor consists of Datapath ALU Registers Control unit ALU (Arithmetic logic unit) Performs arithmetic and logic operations Control unit (CU) Generates the control signals required to execute instructions Memory Address Space Address Space is the set of memory locations (bytes) that are addressable Next ... Basic Computer Organization IA-32 Registers Instruction Execution Cycle Registers Registers are high speed memory inside the CPU Eight 32-bit general-purpose registers Six 16-bit segment registers Processor Status Flags (EFLAGS) and Instruction Pointer (EIP) 32-bit General-Purpose Registers EAX EBP EBX ESP ECX ESI EDX EDI 16-bit Segment Registers EFLAGS CS ES SS FS EIP DS GS General-Purpose Registers Used primarily for arithmetic and data movement mov eax 10 ;move constant integer 10 into register eax Specialized uses of Registers eax – Accumulator register Automatically
    [Show full text]
  • Lecture #2 "Computer Systems Big Picture"
    18-600 Foundations of Computer Systems Lecture 2: “Computer Systems: The Big Picture” John P. Shen & Gregory Kesden 18-600 August 30, 2017 CS: AAP CS: APP ➢ Recommended Reference: ❖ Chapters 1 and 2 of Shen and Lipasti (SnL). ➢ Other Relevant References: ❖ “A Detailed Analysis of Contemporary ARM and x86 Architectures” by Emily Blem, Jaikrishnan Menon, and Karthikeyan Sankaralingam . (2013) ❖ “Amdahl’s and Gustafson’s Laws Revisited” by Andrzej Karbowski. (2008) 8/30/2017 (©J.P. Shen) 18-600 Lecture #2 1 18-600 Foundations of Computer Systems Lecture 2: “Computer Systems: The Big Picture” 1. Instruction Set Architecture (ISA) a. Hardware / Software Interface (HSI) b. Dynamic / Static Interface (DSI) c. Instruction Set Architecture Design & Examples 2. Historical Perspective on Computing a. Major Epochs of Modern Computers b. Computer Performance Iron Law (#1) 3. “Economics” of Computer Systems a. Amdahl’s Law and Gustafson’s Law b. Moore’s Law and Bell’s Law 8/30/2017 (©J.P. Shen) 18-600 Lecture #2 2 Anatomy of Engineering Design SPECIFICATION: Behavioral description of “What does it do?” Synthesis: Search for possible solutions; pick best one. Creative process IMPLEMENTATION: Structural description of “How is it constructed?” Analysis: Validate if the design meets the specification. “Does it do the right thing?” + “How well does it perform?” 8/30/2017 (©J.P. Shen) 18-600 Lecture #2 3 [Gerrit Blaauw & Fred Brooks, 1981] Instruction Set Processor Design ARCHITECTURE: (ISA) programmer/compiler view = SPECIFICATION • Functional programming model to application/system programmers • Opcodes, addressing modes, architected registers, IEEE floating point IMPLEMENTATION: (μarchitecture) processor designer view • Logical structure or organization that performs the ISA specification • Pipelining, functional units, caches, physical registers, buses, branch predictors REALIZATION: (Chip) chip/system designer view • Physical structure that embodies the implementation • Gates, cells, transistors, wires, dies, packaging 8/30/2017 (©J.P.
    [Show full text]
  • Evaluation of Synthesizable CPU Cores
    Evaluation of synthesizable CPU cores DANIEL MATTSSON MARCUS CHRISTENSSON Maste r ' s Thesis Com p u t e r Science an d Eng i n ee r i n g Pro g r a m CHALMERS UNIVERSITY OF TECHNOLOGY Depart men t of Computer Engineering Gothe n bu r g 20 0 4 All rights reserved. This publication is protected by law in accordance with “Lagen om Upphovsrätt, 1960:729”. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the authors. Daniel Mattsson and Marcus Christensson, Gothenburg 2004. Evaluation of synthesizable CPU cores Abstract The three synthesizable processors: LEON2 from Gaisler Research, MicroBlaze from Xilinx, and OpenRISC 1200 from OpenCores are evaluated and discussed. Performance in terms of benchmark results and area resource usage is measured. Different aspects like usability and configurability are also reviewed. Three configurations for each of the processors are defined and evaluated: the comparable configuration, the performance optimized configuration and the area optimized configuration. For each of the configurations three benchmarks are executed: the Dhrystone 2.1 benchmark, the Stanford benchmark suite and a typical control application run as a benchmark. A detailed analysis of the three processors and their development tools is presented. The three benchmarks are described and motivated. Conclusions and results in terms of benchmark results, performance per clock cycle and performance per area unit are discussed and presented. Sammanfattning De tre syntetiserbara processorerna: LEON2 från Gaisler Research, MicroBlaze från Xilinx och OpenRISC 1200 från OpenCores utvärderas och diskuteras.
    [Show full text]
  • MIPS Architecture with Tomasulo Algorithm [12]
    CALIFORNIA STATE UNIVERSITY NORTHRIDGE TOMASULO ARCHITECTURE BASED MIPS PROCESSOR A graduate project submitted in partial fulfilment for the requirement Of the degree of Master of Science In Electrical Engineering By Sameer S Pandit May 2014 The graduate project of Sameer Pandit is approved by: ______________________________________ ____________ Dr. Ali Amini, Ph.D. Date _______________________________________ ____________ Dr. Shahnam Mirzaei, Ph.D. Date _______________________________________ ____________ Dr. Ramin Roosta, Ph.D., Chair Date California State University Northridge ii ACKNOWLEDGEMENT I would like to express my gratitude towards all the members of the project committee and would like to thank them for their continuous support and mentoring me for every step that I have taken towards the completion of this project. Dr. Roosta, for his guidance, Dr. Shahnam for his ideas, and Dr. Ali Amini for his utmost support. I would also like to thank my family and friends for their love, care and support through all the tough times during my graduation. iii Table of Contents SIGNATURE PAGE .......................................................................................................... ii ACKNOWLEDGEMENT ................................................................................................. iii LIST OF FIGURES .......................................................................................................... vii ABSTRACT .......................................................................................................................
    [Show full text]
  • Chapter 1 + Basic Concepts and Computer Evolution Computer Architecture 2 Computer Organization
    1 Chapter 1 + Basic Concepts and Computer Evolution Computer Architecture 2 Computer Organization • Attributes of a • Instruction set, system visible to number of bits used to represent various the programmer data types, I/O • Have a direct mechanisms, impact on the techniques for logical execution addressing memory of a program Architectural Computer attributes Architecture include: Organizational Computer attributes Organization include: • The operational • Hardware details units and their transparent to the interconnections programmer, control that realize the signals, interfaces between the computer and architectural peripherals, memory specifications technology used + IBM System 370 Architecture 3 ◼ IBM System/370 architecture ◼ Was introduced in 1970 ◼ Included a number of models ◼ Could upgrade to a more expensive, faster model without having to abandon original software ◼ New models are introduced with improved technology, but retain the same architecture so that the customer’s software investment is protected ◼ Architecture has survived to this day as the architecture of IBM’s mainframe product line System/370-145 system console. + 4 Structure and Function ◼Structure ◼ The way in which ◼ Hierarchical system components relate to each other ◼ Set of interrelated subsystems ◼Function ◼ Hierarchical nature of complex ◼ The operation of individual systems is essential to both components as part of the their design and their structure description ◼ Designer need only deal with a particular level of the system at a time ◼ Concerned
    [Show full text]